FSD - Internet Ordering System-1
FSD - Internet Ordering System-1
2.1 Data Flow Diagram, Application Screen Flow, Sitemap, and Process Flows
2.1.1 High Level Data Flow Diagram
Receive Notifications
Sign Up Sign In
Sub-domain Dashboard
Manage Notification
Home Account Drugs Medical Disposables Requests
View Categories
View Dashboard View Profile View View View
Edit Profile
View Drug Details Search View Requests
summary
Delete
Change Password
Add into Add into Request form Track Requests
Request form
Logout
Sign In
Admin
Dashboard
Generate report of
Edit Theme Edit Search Respond Search
dispense
View Requests Add sub domain Add User Fill Form to Add Add Add more quantity
Sign In
Click on Enter
Start Sign In Sign In
button Details End
User
Manage Profile
True
Password Matched
False
Entered Password?
Manage Requests
button End
Update Status
False
True
Manage Profile
Administrator
Display Password
Display Error Confirm Old Updated
Message False Password?
Displays Updates the Display Change Successfully
Profile changes Password Screen
True
True
Password Matched
False
Entered Password?
Manage Profile
Administrator
Display Password
Display Error Confirm Old Updated
Message False Password?
Displays Updates the Display Change Successfully
Profile changes Password Screen
True
True
Password Matched
False
Entered Password?
Yes
Confirm
Remove
System
Display Users
Cancel
Page
Add User
Administrator
Manage Dashboard
Administrator
Click on
Click on Click on Widgets Edits the
Start Manage End
Home to Add or Remove Theme
Widgets
System
Display Users,
Display Widgets Display Display
Statistics, Updated
for Dashboard Updated
Requests Dashboard Dashboard
Manage Stock
Administrator
Yes
Confirm add
Display product in
System
Display updated
Cancel
stock Section
Manage Order
Administrator
Yes
Display
System
Confirm
Order Display Results order?
Section
Display Cancel
Cancel
order status
Product Owner
Development team
Business Analyst
QA team
Visitors
Customers
Contractors
Admin
3. Functional Specifications
3.1 Functional Requirements
Functional requirements describe all the operational features that must be implemented in the
system to allow users to perform their tasks thoroughly. Following are the functionalities of the
system under consideration.
FR-10 The system shall be able to provide the facility to view all the drug list.
FR-11 The system shall be able to provide the facility to update the profile data.
FR-14 The system shall be able to provide the facility to change user’s password.
Browse Drugs
FR-15 The system shall be able to provide the facility to the users to view available
drugs.
FR-16 The system shall be able to provide the facility to view available medical
disposables.
FR-17 The system shall be able to provide the facility to customers to browse drugs by
various identifiers.
Name
Brand
FR-18 The system shall be able to provide the facility to users to view a thumbnail
of the relevant drugs as well as a brief description of each drug.
Request Drugs
FR-19 The system shall be able to provide the facility to the users to request drugs.
.
FR-20 The system shall be able to provide the facility to check the status of the requests
FR-16 The system shall be able to provide the facility to keep track of each drug
stock.
Manage order
FR-17 The system shall be able to provide the facility that admin to dispatch drug based
on first come first out order
.
View Suppliers
FR-18 The system shall be able to provide the facility to view supplier details.
FR-19 The system shall be able to provide the facility to keep track of payment details of
suppliers.
Relational Database
Authentication (for order management)
and User Services
Authorization
Delivery Engine
Admin Order
Service
Payment
service
Elastic Search Cluster
UI API Gateway
Sub-domains Inventory
service
Tracking
Service
Central
Message
Queue
Micro
services
Notification Service
2. Windows 8, 10, 11
S_3: Whenever the user writes a password, the system must encrypt it using a hashing
algorithm to assure privacy and confidentiality.
S_4: The system should encrypt sensitive data, in transit and at rest, to protect it from
unauthorized access.
S_5: The system shall not leave any cookies on the user’s device containing the user’s
password. S_6: The system should not allow access to information outside of the user’s
authorized scope. S_7: The user’s data must only be accessible by the administrators of the
system.
5.4 Availability
A_1: The users should be able to use the system 24 hours per day, 7 days a week, 365 days a
year (99% of the time.), except during updates or maintenance.
A_2: The system should notify users of planned downtime five days prior to the downtime.
A_4: Maintenance of the system should be handled on time other than during office hours for
the region
A_5: Unplanned downtime should be handled on an immediate basis to make the system
available for users again
A_7: The system should have a reliable data recovery system to protect the data loss.
5.5 Expendability
E_1: The system should be able to handle a high volume of users without crashing down
E_2: The system should have capability to add new features without disrupting the flow of
already existing features.
5.6 Maintainability
M_1: The system should be easy to make changes at the code level, and the code should be well
refactored.
M_2: The system should be designed in modular way to make it easier to update and modify
individual components
5.1 Responsiveness
R_1: The system will have a responsive user interface for browser in all devices, i.e. mobiles,
desktop computers, laptops, and tablets.
DMR.01 The system shall be able to migrate data from paper to High
digital documents.
DMR.02 The system shall be able to migrate data from hard disk Medium
drives (HDDs) to faster and more durable solid-state
drives (SSDs)
DMR.04 The system shall be able to upgrade to the latest version of Medium
DBMS (so-called homogeneous migration)
DMR.05 The system shall be able to switch to a new DBMS from a High
different provider — for example, from MySQL to
PostgreSQL or from Oracle to MSSQL
DMR.06 The system shall be able to move data from one computing Medium
environment to another.
DMR.07 The system shall be able to work with different data Medium
formats.
DMR.08 The system shall be able to keep data safe during relocation Medium
of existing computers and wires to other premises
DMR.09 The system shall be able to protect data while moving Medium
digital assets, including data and business applications to
new servers and storage.
DMR.11 The system shall be able to move data from on-premises to Medium
the cloud or between different cloud environments without
loss of any data.
● Knowing the data: Before migration, source data needs to undergo a complete audit.
Unexpected issues can surface if this step is ignored.
● Cleanup: Once you identify any issues with your source data, they must be resolved.
This may require additional software tools and third-party resources because of the scale
of the work.
● Maintenance and protection: Data undergoes degradation after a period, making it
unreliable. This means there must be controls in place to maintain data quality.
● Governance: Tracking and reporting on data quality is important because it enables a
better understanding of data integrity. The processes and tools used to produce this
information should be highly usable and automate functions where possible.
5.1.1 Data Migration Strategies
There is more than one way to build a data migration strategy. An organization’s specific
business needs and requirements will help establish what’s most appropriate. However, most
strategies fall into one of two categories: “big bang” or “trickle.”